Information Dominance Anytime, Anywhere… Program Executive Office Command, Control, Communications, Computers and Intelligence (PEO C4I) Statement A: Approved.

Slides:



Advertisements
Similar presentations
Mobility in Government Consolidation & Wrap-up Lee Naik3 Oct 2013.
Advertisements

Eric DeGraff Director July OVERVIEW X-Feds, Inc. Proprietary  X-Feds is dedicated to providing superior expertise in technical consulting services.
Panel 5: The Latest in OA Innovation and C4ISR 4 November, 2014 Mike Rice President / Senior Systems Engineer R2E Inc.
SPAWAR CTO: Meeting the Transition Challenge Dr. Roger Boss – for Rob Wolborsky CTO and 7.0 S&T National Lead 17 Nov 2010 Distribution A: Approved for.
GAMMA Overview. Key Data Grant Agreement n° Starting date: 1 st September 2013 Duration: 48 months (end date 31 st August 2017) Total Budget:
Information Dominance Anytime, Anywhere… Program Executive Office Command, Control, Communications, Computers and Intelligence (PEO C4I) Statement A: Approved.
MCIWEST Information Assurance Mr. David Robbins MCIWEST Information Assurance Manager (Bldg 24200) Camp Pendleton, CA Comm: (760) DSN:
International CyberSecurity Collaboration: The Technical Cooperation Program Approved for public release; distribution is unlimited. 09 March 2010 Joshua.
The shadow war: What policymakers need to know about cybersecurity Eric Miller Vice President, Policy, Innovation, and Competitiveness Canadian Council.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Prepared for: DISA September 17, 2003 Establishing a Government Information Security System Presented to the IT AND COMMUNICATIONS SYSTEMS SECURITY CONFERENCE.
Brian Connett, LCDR, USN US NAVAL ACADEMY
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
The U.S. Coast Guard’s Role in Cybersecurity
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 1 Electronic Warfare Information Operations 29 MAR 2011 Val O’Brien.
Secure Cyber Incident Information Sharing UTSA Team Leads Dr. Ram Krishnan, Assistant Professor, ECE Dr. Ravi Sandhu, Executive Director, ICS April 30,
1 UNCLASSIFIED Army Enterprise Migration to DISA LTC Peter Barclay, CIO/G6 Mr. Kevin Mott, NETCOM Mr. Jose Ortega, PEO EIS Mr. Donald Greenlee, PEO.
CYBERSAFE Overview AFCEA C4ISR Symposium 28 April 2015
(Geneva, Switzerland, September 2014)
Integrated Information Technology (IT) & Information Assurance (IA)
11 DoD Information Sharing Update for WJTSC Plenary Session Office of the Assistant Secretary of Defense for Networks and Information Integration OASD(NII)
The gun trials of the Brazilian dreadnought Minas Geraes.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Mr. Charles Adams Transport & Computing Infrastructure (TCI) Business Portfolio Lead Statement A: Approved for public release; Distribution is unlimited.
A Combat Support Agency Defense Information Systems Agency UNCLASSIFIED Program Executive Office GIG Enterprise Services (PEO-GES) 101 Briefing As of October.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Forge.mil Success Stories and Lessons Learned
Honeywell Proprietary Honeywell.com  0 Document control number Honeywell Technology Solutions Inc. Overview November 2007.
1 As a public interest company, MITRE works in partnership with the government to address issues of critical national
Charleston Defense Contractors Association Small Business and Industry Outreach Initiative 22 July, 2010.
FY2011 Harris Corporation Overview Page 1 Harris Corporation Overview.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Enterprise User Enabling Warfighter Capability
Cyber-Attack On Department Of Defense. Overview Washington has reported that there has been a widespread attack on Defense Department computers that may.
I n t e g r i t y - S e r v i c e - E x c e l l e n c e Headquarters U.S. Air Force 1 Lt Gen Bill Lord, SAF/CIO A6 Chief of Warfighting Integration and.
Assessment Presentation Philip Robbins - July 14, 2012 University of Phoenix Hawaii Campus Fundamentals of Information Systems Security.
Secure Cyber Incident Information Sharing UTSA Team Leads Dr. Ram Krishnan, Assistant Professor, ECE Dr. Ravi Sandhu, Professor (CS) and Executive Director.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Information Sharing Challenges, Trends and Opportunities
Security Innovation & Startup. OPEN THREAT EXCHANGE (OTX): THE HISTORY AND FUTURE OF OPEN THREAT INTELLIGENCE COMMUNITY ALIENVAULT OTX.
Understanding Technology Stakeholders: Their Progress and Challenges John M. Gilligan Software Assurance Forum November 4, 2009.
SSC Pacific – A Strong Community Partner And Economic Engine… Yesterday, Today and Tomorrow CAPT Mark Kohlheim, Commanding Officer 17 NOV 09 SSC Pacific.
Ali Alhamdan, PhD National Information Center Ministry of Interior
How we work as a national CERT in China ZHOU Yonglin CNCERT/CC, China 2 Addressing security challenges on a global scaleGeneva, 6-7 December 2010.
Fax: (703) DoD BIOMETRICS PROGRAM DoD Biometrics Management Office Phone: (703)
Microsoft in Defence Michel van der Bel Vice President Microsoft International.
CAPT Brian Hinkley Director, Fleet EW Center 15 October 2009
SECRET Internet Protocol Router Network (SIPRNET)
Government and Industry IT: one vision, one community Vice Chairs April Meeting Agenda Welcome and Introductions GAPs welcome meeting with ACT Board (John.
Joint Program Executive Office for Chemical and Biological Defense
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
1 Innovation & Transformation: Enabling Information Superiority for the Warfighter Mr. Arthur R. Friedman OASD(NII)/DoD CIO 4 October 2006.
CNCI-SCRM STANDARDIZATION Discussion Globalization Task Force OASD-NII / DoD CIO Unclassified / FOUO.
Protecting Against Cyber Challenges Pacific Operational Science & Technology Conference 15 March 2011 Rob Wolborsky Chief Technology Officer Space and.
Security Threats Caela Harris. What is a Virus A computer virus or a computer worm is a malicious software program that can self replicate on computer.
Regional Cyber Crime Unit
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
© 2009 IBM Corporation IBM Software Group, Federal Strategy Concept of Operations - Dynamic Defense of the GIG, enabled by a smarter infrastructure Herb.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Executive Director and Endowed Chair
Bryan L. Williams, Ph.D. SPAWARSYSCEN Atlantic Scientist Research and Applied Science Office of Naval Research Science and Technology Awareness Workshop.
DISA Global Operations
Program Executive Office GIG Enterprise Services (PEO-GES)
McAfee Activate  McAfee offers advanced security solutions to the computer users across the globe.  It offers a wide selection of antivirus and internet.
Advanced RF Mapping – RadioMap
Strategic Partnerships to Increase Student and Faculty Opportunities
Molly Donohue Magee, Executive Director June 2019
Presentation transcript:

Information Dominance Anytime, Anywhere… Program Executive Office Command, Control, Communications, Computers and Intelligence (PEO C4I) Statement A: Approved for public release; distribution is unlimited PMW 130 Overview for 8 th Annual Security Summit 22 March 2011 Kevin McNally Program Manager PMW

New Era in Collaboration 2

Conficker Spreading 3 United Kingdom Ministry of Defense: Reported infection of over 800 computers United Kingdom Ministry of Defense: Reported infection of over 800 computers 15 Jan 09: French Navy infected, forcing aircraft at several airbases to be grounded 15 Jan 09: French Navy infected, forcing aircraft at several airbases to be grounded 2 Feb 09: Federal Republic of Germany reported 100 computers infected 2 Feb 09: Federal Republic of Germany reported 100 computers infected Feb 09: Manchester City Council’s IT system case caused an estimated L1.5m. Believed to be due to flash drives Feb 09: Manchester City Council’s IT system case caused an estimated L1.5m. Believed to be due to flash drives 24 March 09: British Director of Parliamentary ICT Informed users of the House of Commons were infected 24 March 09: British Director of Parliamentary ICT Informed users of the House of Commons were infected Jan 10: Greater Manchester Police were disconnected from Police National Computer for three days Jan 10: Greater Manchester Police were disconnected from Police National Computer for three days

Conficker 4

Why Do We Need to Collaborate? Over 1.97 billion Internet users (420M in China) DoD makes 1 billion+ Internet connections daily, passing 40TBs of data DoD Networks scanned and probed 6M times/day - USCYBERCOM 25M new strains of viruses last year, compared to a combined total of 15 million throughout the last 20 years – Panda Security Annual Report Several years ago, zero countries armed for cyber warfare, today 20+ countries – Dr. Eric Cole, McAfee Stuxnet – Most advanced Cyber Weapon ever seen – CEO McAfee Zeus, aka Zbot, a toolkit to build your own trojan horse, can be purchased for $ Because we are all interconnected, one compromised network can compromise us all. Because we are all interconnected, one compromised network can compromise us all.

Information Assurance & Cyber Security (PMW 130) Computer Network Defense (CND) – ACAT IVT EKMS/KMI - Component of NSA – ACAT IAM PKI - Component of DISA – ACAT IAM Cryptography (modernization; legacy)  Navy, USMC, USCG, MSC Radiant Mercury (RM) – Cross Domain Solution Tactical Key Loader (TKL) – USMC and SPECOPS Information Assurance (IA) Services 6

Cyber Defense and the Navy What Lies Ahead Speed to capability - reaction to emerging threats Collaboration with IC and NGOs on threats Identifying network anomalies & behaviors Moving from reactive to predictive Advanced Persistent Threat Data loss prevention Cloud Security Wireless/handheld devices Advanced spear phishing Web security, Social Networks Web enabled applications/application security Correlation and Analysis of sensor data 7

Future Collaboration Collaboration is vital to our future Welcome collaboration across government, commercial, academia and other stakeholders PMW 130 Government/Industry Exchange  An opportunity for industry to present products they feel may be of interest to PMW 130  Attendees include PMW 130 senior leadership, SPAWAR and PEO C4I invitees, and other PMW 130 personnel (Assistant Program Managers, engineers, etc.)  Held once a month  50 minutes, including Q&A  Please contact Carol Cooper at 8

We get IT. We also integrate it, install it and support it. For today and tomorrow. 9 Visit us at